City: Jakarta
Region: Jakarta Raya
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
103.52.217.157 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 100 |
2020-10-14 00:18:26 |
103.52.217.157 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 100 |
2020-10-13 15:30:30 |
103.52.217.157 | attackspambots | IP 103.52.217.157 attacked honeypot on port: 1212 at 10/12/2020 1:46:16 PM |
2020-10-13 08:06:21 |
103.52.216.216 | attack | TCP ports : 139 / 8388 |
2020-10-04 09:02:51 |
103.52.216.216 | attackspambots | TCP ports : 139 / 8388 |
2020-10-04 01:38:16 |
103.52.216.216 | attackbots | [N3.H3.VM3] Port Scanner Detected Blocked by UFW |
2020-10-03 17:24:01 |
103.52.216.40 | attackspambots | Automatic report - Banned IP Access |
2020-09-29 00:23:35 |
103.52.216.40 | attack | 20000/tcp 137/udp 32773/udp... [2020-08-25/09-27]5pkt,3pt.(tcp),2pt.(udp) |
2020-09-28 16:25:28 |
103.52.217.227 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 98 - port: 10443 proto: tcp cat: Misc Attackbytes: 60 |
2020-07-30 22:13:35 |
103.52.217.65 | attackspam | Jul 25 15:52:29 debian-2gb-nbg1-2 kernel: \[17943664.226040\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=103.52.217.65 DST=195.201.40.59 LEN=68 TOS=0x08 PREC=0x00 TTL=232 ID=54321 PROTO=UDP SPT=47028 DPT=787 LEN=48 |
2020-07-25 23:00:20 |
103.52.217.89 | attack | Unauthorized connection attempt detected from IP address 103.52.217.89 to port 9600 |
2020-07-22 18:18:16 |
103.52.216.52 | attack | Unauthorized connection attempt detected from IP address 103.52.216.52 to port 79 |
2020-07-22 17:31:08 |
103.52.217.57 | attackspambots | Honeypot attack, port: 135, PTR: PTR record not found |
2020-07-22 15:06:31 |
103.52.217.65 | attackspam | Unauthorized connection attempt detected from IP address 103.52.217.65 to port 873 |
2020-07-22 14:46:11 |
103.52.255.2 | attack | 1594732355 - 07/14/2020 15:12:35 Host: 103.52.255.2/103.52.255.2 Port: 445 TCP Blocked |
2020-07-15 01:56:57 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.52.2.0 - 103.52.2.255'
% Abuse contact for '103.52.2.0 - 103.52.2.255' is 'abuse.alert@abhinawa.co.id'
inetnum: 103.52.2.0 - 103.52.2.255
netname: IDNIC-ABHINAWA-ID
descr: PT Abhinawa Sumberdaya Asia
descr: Corporate / Direct Member IDNIC
descr: Signature Park Grande Complex Unit R/GF/15.
descr: Jl. MT Haryono Kav.20, Jakarta, 13630
admin-c: SD1037-AP
tech-c: SD1037-AP
country: ID
mnt-by: MAINT-ID-ABHINAWA
mnt-irt: IRT-ABHINAWA-ID
mnt-routes: MAINT-ID-ABHINAWA
status: ASSIGNED NON-PORTABLE
last-modified: 2024-04-20T00:21:00Z
source: APNIC
irt: IRT-ABHINAWA-ID
address: PT Abhinawa Sumberdaya Asia
address: Signature Park Grande Complex Unit R/GF/15.
address: Jl. MT Haryono Kav.20, Jakarta, 13630
e-mail: abuse.alert@abhinawa.co.id
abuse-mailbox: abuse.alert@abhinawa.co.id
admin-c: SD1037-AP
tech-c: SD1037-AP
auth: # Filtered
mnt-by: MAINT-ID-ABHINAWA
last-modified: 2025-09-04T04:38:38Z
source: APNIC
person: Syafenri Deputra
address: Signature Park Grande Complex Unit R/GF/15
country: ID
phone: +628113731000
e-mail: support@abhinawa.co.id
nic-hdl: SD1037-AP
mnt-by: MNT-APJII-ID
last-modified: 2020-12-28T05:39:47Z
source: APNIC
% Information related to '103.52.2.0/24AS138077'
route: 103.52.2.0/24
descr: Advertise via AS138077
origin: AS138077
mnt-by: MAINT-ID-ABHINAWA
last-modified: 2024-04-18T10:10:24Z
source: APNIC
% Information related to '103.52.2.0 - 103.52.2.255'
inetnum: 103.52.2.0 - 103.52.2.255
netname: IDNIC-ABHINAWA-ID
descr: PT Abhinawa Sumberdaya Asia
descr: Corporate / Direct Member IDNIC
descr: Signature Park Grande Complex Unit R/GF/15.
descr: Jl. MT Haryono Kav.20, Jakarta, 13630
admin-c: SD1037-AP
tech-c: SD1037-AP
country: ID
mnt-by: MAINT-ID-ABHINAWA
mnt-irt: IRT-ABHINAWA-ID
mnt-routes: MAINT-ID-ABHINAWA
status: ASSIGNED NON-PORTABLE
last-modified: 2024-04-20T00:21:40Z
source: IDNIC
irt: IRT-ABHINAWA-ID
address: PT Abhinawa Sumberdaya Asia
address: Signature Park Grande Complex Unit R/GF/15
address: Jl. MT Haryono Kav.20, Jakarta, 13630
e-mail: abuse.alert@abhinawa.co.id
abuse-mailbox: abuse.alert@abhinawa.co.id
admin-c: SD1-AP
tech-c: SD1-AP
auth: # Filtered
mnt-by: MAINT-ID-ABHINAWA
last-modified: 2020-12-28T06:04:21Z
source: IDNIC
person: Syafenri Deputra
address: Menara Kadin Indonesia, H.R. Rasuna Said No.X-5 Street, 20th Floor. Kuningan, Setiabudi District, South Jakarta
country: ID
phone: +62811808896
e-mail: syafenri.deputra@abhinawa.co.id
nic-hdl: SD1037-AP
mnt-by: MAINT-ID-ABHINAWA
last-modified: 2023-10-02T03:16:51Z
source: IDNIC
% Information related to '103.52.2.0/24AS138077'
route: 103.52.2.0/24
descr: Advertise via AS138077
origin: AS138077
mnt-by: MNT-APJII-ID
last-modified: 2024-04-18T10:04:51Z
source: IDNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.52.2.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37267
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.52.2.149. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025092800 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 28 16:03:12 CST 2025
;; MSG SIZE rcvd: 105
b'Host 149.2.52.103.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 103.52.2.149.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
192.144.184.92 | attack | Mar 18 12:05:48 amit sshd\[18253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.184.92 user=root Mar 18 12:05:50 amit sshd\[18253\]: Failed password for root from 192.144.184.92 port 46176 ssh2 Mar 18 12:14:50 amit sshd\[18425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.184.92 user=root ... |
2020-03-18 20:26:39 |
203.195.150.227 | attackbots | Mar 18 12:54:00 v22019038103785759 sshd\[31108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.150.227 user=root Mar 18 12:54:02 v22019038103785759 sshd\[31108\]: Failed password for root from 203.195.150.227 port 38336 ssh2 Mar 18 12:56:52 v22019038103785759 sshd\[31269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.150.227 user=root Mar 18 12:56:55 v22019038103785759 sshd\[31269\]: Failed password for root from 203.195.150.227 port 40636 ssh2 Mar 18 12:59:43 v22019038103785759 sshd\[31454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.150.227 user=root ... |
2020-03-18 20:17:50 |
188.254.0.170 | attackspambots | Tried sshing with brute force. |
2020-03-18 20:13:21 |
188.121.0.52 | attack | port scan and connect, tcp 80 (http) |
2020-03-18 20:09:55 |
118.32.131.214 | attackspam | Feb 12 00:28:56 pi sshd[7108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.131.214 Feb 12 00:28:58 pi sshd[7108]: Failed password for invalid user pantera from 118.32.131.214 port 54680 ssh2 |
2020-03-18 19:57:07 |
209.132.252.16 | attackspam | injection sql |
2020-03-18 20:02:15 |
167.114.251.107 | attackspambots | Mar 18 12:48:08 ns382633 sshd\[1168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.251.107 user=root Mar 18 12:48:10 ns382633 sshd\[1168\]: Failed password for root from 167.114.251.107 port 53428 ssh2 Mar 18 12:52:05 ns382633 sshd\[1964\]: Invalid user ident from 167.114.251.107 port 57017 Mar 18 12:52:05 ns382633 sshd\[1964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.251.107 Mar 18 12:52:07 ns382633 sshd\[1964\]: Failed password for invalid user ident from 167.114.251.107 port 57017 ssh2 |
2020-03-18 19:53:33 |
62.196.125.250 | attackbotsspam | Unauthorized connection attempt from IP address 62.196.125.250 on Port 445(SMB) |
2020-03-18 20:06:30 |
14.182.241.59 | attack | Unauthorized connection attempt from IP address 14.182.241.59 on Port 445(SMB) |
2020-03-18 20:26:10 |
113.190.72.91 | attackbotsspam | Unauthorized connection attempt detected from IP address 113.190.72.91 to port 445 |
2020-03-18 19:40:37 |
68.183.19.84 | attackspambots | Mar 18 12:45:01 host01 sshd[10116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.84 Mar 18 12:45:03 host01 sshd[10116]: Failed password for invalid user postgres from 68.183.19.84 port 35602 ssh2 Mar 18 12:49:09 host01 sshd[10704]: Failed password for root from 68.183.19.84 port 56176 ssh2 ... |
2020-03-18 19:59:17 |
106.75.67.48 | attack | web-1 [ssh] SSH Attack |
2020-03-18 19:49:44 |
122.54.141.234 | attackspam | Unauthorized connection attempt from IP address 122.54.141.234 on Port 445(SMB) |
2020-03-18 20:23:00 |
122.51.212.213 | attackspambots | no |
2020-03-18 20:31:40 |
118.163.49.39 | attackbotsspam | Unauthorized connection attempt from IP address 118.163.49.39 on Port 445(SMB) |
2020-03-18 20:03:19 |